VYPR
Unrated severityNVD Advisory· Published Apr 10, 2015· Updated May 6, 2026

CVE-2015-1146

CVE-2015-1146

Description

The Code Signing implementation in Apple OS X before 10.10.3 does not properly validate signatures, which allows local users to bypass intended access restrictions via a crafted bundle, a different vulnerability than CVE-2015-1145.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apple OS X before 10.10.3 has a code signing validation flaw allowing local privilege escalation via crafted bundles.

Vulnerability

The Code Signing implementation in Apple OS X before 10.10.3 does not properly validate signatures, allowing local users to bypass intended access restrictions via a crafted bundle. This affects OS X Yosemite v10.10 through v10.10.2 and earlier versions [1].

Exploitation

A local attacker can craft a malicious bundle with an invalid or modified signature. By exploiting the improper validation, the attacker can cause the system to treat the bundle as signed by a trusted source, bypassing security checks.

Impact

Successful exploitation allows the attacker to bypass access restrictions, potentially gaining elevated privileges or accessing protected resources. The scope of compromise depends on the bundle's context, but could lead to local privilege escalation.

Mitigation

Apple addressed this vulnerability in OS X 10.10.3, released on April 8, 2015. Users should update to OS X 10.10.3 or later via the Software Update mechanism [1]. No workarounds were provided.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.